Jump to content
Double Fine Action Forums

franciscotufro

DFA Backers
  • Content Count

    9
  • Joined

  • Last visited

About franciscotufro

  • Rank
    Newbie

Converted

  • URL
    http://quov.is
  1. That's the encryption method, once we find the password AND the encrypted dataset (which I believe is the one in the announcement) you can run the dataset through openssl using the encryption method aes-256-cbc and with the password you'll get the actual content. Oh, thanks. I'm not sure how to do that, but sounds good. I like ciphers, but I'm sorta old school, get a bit lost when it comes to modern ciphers. If you have a mac or a linux in the command line openssl aes-256-cbc-d -in encrypted_file -out decrypted_file
  2. That's the encryption method, once we find the password AND the encrypted dataset (which I believe is the one in the announcement) you can run the dataset through openssl using the encryption method aes-256-cbc and with the password you'll get the actual content. Would the encrypted dataset be the audio for the video? I guess it's that or the application data below in the announcement.
  3. That's the encryption method, once we find the password AND the encrypted dataset (which I believe is the one in the announcement) you can run the dataset through openssl using the encryption method aes-256-cbc and with the password you'll get the actual content.
  4. I saw whether any images might have cleverly been encoded in the spectograph of the audio, didn't come up with anything though. Did you try looking at it as if it was a magic eye? It would follow if they tried to do the stereo thing there as well, given the message. I've tried inverting one channel to see if that cancelled out the non-noise sounds, but with no luck.
  5. I've extracted the sound: you can download it right there
  6. The container for the video is Quicktime (at least my linux box detects it as qt), let's see if we can break its content.
  7. I'm hoping someone can find a password or key so we can use this website to decode it by converting each base64 line using this into hex. If anyone has Linux then this is the command line way to do it (and probably a lot simpler). EDIT: and we already know the settings are aes-256-cbc from the mp3 in the jpg-zip-thing. I'm on Linux and have been trying some passwords, now I'm working on the alphabet.
  8. That part of the message in the news post is referred to as the "encrypted_payload", so it must be the thing we're trying to decrypt. Exactly.
  9. So does anyone have this handy? Once we have this, we can start trying some "incantations" "in all capital letters" on the encrypted file (assuming it's one of the files in the zip). It's probably related to the announcement https call in the bottom: http://www.doublefine.com/news/comments/announcing_hack_n_slash_its_real_and_it_has_algorithms/
×
×
  • Create New...